<html><head></head><body>Lists is still here!<br><br>She needs to reset the password on the wifi at home after a factory reset. Tape username and password to underside of unit. File for a temporary restraining order explaining the network hack. Factory reset on the phone. Might want to back up contacts and pictures and texts first. <br><br>If text from ex is threatening, it must be printed to paper with timestamp for court.<br><br>To repeat: she NEEDS to request a temporary restraining order immediately. This will not go on any searchable record for the temporary period. It's good for a year. If he violates it, she calls police and sheriff pulls him to jail and she requests it become permanent. If he violates the permanent, it's straight to prison with a felony record. She must tell police of restraining order to get them to move.<br><br>The worst part of this is she must sit alone in the court room unless she lawyers up. If she can drop $500 on a lawyer to represent her at court, she should. Tell her to get a female lawyer.<br><br><div class="gmail_quote">On December 13, 2018 3:14:48 PM EST, David Jackson via Ale <ale@ale.org> wrote:<blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;">
<div dir="ltr">Hi,<div><br></div><div>I was helping to teach a class last night and a young lady asked me for some help afterwards. It seems an ex-boyfriend has hacked her Android phone and gotten into her wifi. </div><div><br></div><div>She showed me a script on her phone that looked like a normal init script for a linux device, but I don't know Androids from Asteroids, so I thought I'd ask here:</div><div><br></div><div>Can she join the list and post her questions? (She needs to use public PCs I guess)</div><div><br></div><div>Are there some folks here who could help her out?</div><div><br></div><div>Can anyone still subscribe to the mailing list?</div><div><br></div><div>Thanks!</div><div><br></div><div>Dave</div></div>
</blockquote></div><br>-- <br>Sent from my Android device with K-9 Mail. All tyopes are thumb related and reflect authenticity.</body></html>